This article describes how one can setup and perform a small wireless demonstration that is quick and easy to perform with a good visual result to trigger the attention of your co-workers. The goal of the setup is to demonstrate a well-known WEP vulnerability (802.11b).

In this article, Prentice Tyndall discusses the radio modulation schemes behind wireless networking and look at the security vulnerabilities behind these schemes as they apply to wireless topologies. Also discussed are the history of wireless modulation techniques and
discover why the wireless frontier has arrived to the place that it is today.

This paper, written by Aaron Sawyer, aims to give a brief history of wireless security, educate the WLAN administrator about the dangerous vulnerabilities of wireless networking, and make practical suggestions about how to close the door on potential intruders.